629 research outputs found

    A new algorithm for minutiae extraction and matching in fingerprint

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.A novel algorithm for fingerprint template formation and matching in automatic fingerprint recognition has been developed. At present, fingerprint is being considered as the dominant biometric trait among all other biometrics due to its wide range of applications in security and access control. Most of the commercially established systems use singularity point (SP) or ‘core’ point for fingerprint indexing and template formation. The efficiency of these systems heavily relies on the detection of the core and the quality of the image itself. The number of multiple SPs or absence of ‘core’ on the image can cause some anomalies in the formation of the template and may result in high False Acceptance Rate (FAR) or False Rejection Rate (FRR). Also the loss of actual minutiae or appearance of new or spurious minutiae in the scanned image can contribute to the error in the matching process. A more sophisticated algorithm is therefore necessary in the formation and matching of templates in order to achieve low FAR and FRR and to make the identification more accurate. The novel algorithm presented here does not rely on any ‘core’ or SP thus makes the structure invariant with respect to global rotation and translation. Moreover, it does not need orientation of the minutiae points on which most of the established algorithm are based. The matching methodology is based on the local features of each minutiae point such as distances to its nearest neighbours and their internal angle. Using a publicly available fingerprint database, the algorithm has been evaluated and compared with other benchmark algorithms. It has been found that the algorithm has performed better compared to others and has been able to achieve an error equal rate of 3.5%

    A survey of fingerprint classification Part II: experimental analysis and ensemble proposal

    Get PDF
    In the first part of this paper we reviewed the fingerprint classification literature from two different perspectives: the feature extraction and the classifier learning. Aiming at answering the question of which among the reviewed methods would perform better in a real implementation we end up in a discussion which showed the difficulty in answering this question. No previous comparison exists in the literature and comparisons among papers are done with different experimental frameworks. Moreover, the difficulty in implementing published methods was stated due to the lack of details in their description, parameters and the fact that no source code is shared. For this reason, in this paper we will go through a deep experimental study following the proposed double perspective. In order to do so, we have carefully implemented some of the most relevant feature extraction methods according to the explanations found in the corresponding papers and we have tested their performance with different classifiers, including those specific proposals made by the authors. Our aim is to develop an objective experimental study in a common framework, which has not been done before and which can serve as a baseline for future works on the topic. This way, we will not only test their quality, but their reusability by other researchers and will be able to indicate which proposals could be considered for future developments. Furthermore, we will show that combining different feature extraction models in an ensemble can lead to a superior performance, significantly increasing the results obtained by individual models.This work was supported by the Research Projects CAB(CDTI), TIN2011-28488, and TIN2013-40765-P

    Ridge orientation modeling and feature analysis for fingerprint identification

    Get PDF
    This thesis systematically derives an innovative approach, called FOMFE, for fingerprint ridge orientation modeling based on 2D Fourier expansions, and explores possible applications of FOMFE to various aspects of a fingerprint identification system. Compared with existing proposals, FOMFE does not require prior knowledge of the landmark singular points (SP) at any stage of the modeling process. This salient feature makes it immune from false SP detections and robust in terms of modeling ridge topology patterns from different typological classes. The thesis provides the motivation of this work, thoroughly reviews the relevant literature, and carefully lays out the theoretical basis of the proposed modeling approach. This is followed by a detailed exposition of how FOMFE can benefit fingerprint feature analysis including ridge orientation estimation, singularity analysis, global feature characterization for a wide variety of fingerprint categories, and partial fingerprint identification. The proposed methods are based on the insightful use of theory from areas such as Fourier analysis of nonlinear dynamic systems, analytical operators from differential calculus in vector fields, and fluid dynamics. The thesis has conducted extensive experimental evaluation of the proposed methods on benchmark data sets, and drawn conclusions about strengths and limitations of these new techniques in comparison with state-of-the-art approaches. FOMFE and the resulting model-based methods can significantly improve the computational efficiency and reliability of fingerprint identification systems, which is important for indexing and matching fingerprints at a large scale

    Biometrics

    Get PDF
    Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The book consists of 13 chapters, each focusing on a certain aspect of the problem. The book chapters are divided into three sections: physical biometrics, behavioral biometrics and medical biometrics. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from both physiological, behavioural and other points of view. It aims to publish new insights into current innovations in computer systems and technology for biometrics development and its applications. The book was reviewed by the editor Dr. Jucheng Yang, and many of the guest editors, such as Dr. Girija Chetty, Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park, Dr. Sook Yoon and so on, who also made a significant contribution to the book

    Error propagation in pattern recognition systems: Impact of quality on fingerprint categorization

    Get PDF
    The aspect of quality in pattern classification has recently been explored in the context of biometric identification and authentication systems. The results presented in the literature indicate that incorporating information about quality of the input pattern leads to improved classification performance. The quality itself, however, can be defined in a number of ways, and its role in the various stages of pattern classification is often ambiguous or ad hoc. In this dissertation a more systematic approach to the incorporation of localized quality metrics into the pattern recognition process is developed for the specific task of fingerprint categorization. Quality is defined not as an intrinsic property of the image, but rather in terms of a set of defects introduced to it. A number of fingerprint images have been examined and the important quality defects have been identified and modeled in a mathematically tractable way. The models are flexible and can be used to generate synthetic images that can facilitate algorithm development and large scale, less time consuming performance testing. The effect of quality defects on various stages of the fingerprint recognition process are examined both analytically and empirically. For these defect models, it is shown that the uncertainty of parameter estimates, i.e. extracted fingerprint features, is the key quantity that can be calculated and propagated forward through the stages of the fingerprint classification process. Modified image processing techniques that explicitly utilize local quality metrics in the extraction of features useful in fingerprint classification, such as ridge orientation flow field, are presented and their performance is investigated

    Strategies for intelligent interaction management and usability of biometric systems

    Get PDF
    Fingerprint biometric systems are one of the most popular biometric systems in current use, which takes a standard measure of a person's fingerprint to compare against the measure from an original stored template, which they have pre-acquired and associated with the known personal identification claimed by the user. Generally, the fingerprint biometric system consists of three stages including a data acquisition stage, a feature extraction stage and a matching extraction. This study will explore some essential limitations of an automatic fingerprint biometric system relating to the effects of capturing poor quality fingerprint images in a fingerprint biometric system and will investigate the interrelationship between the quality of a fingerprint image and other primary components of a fingerprint biometric system, such as the feature extraction operation and the matching process. In order to improve the overall performance of an automatic fingerprint biometric system, the study will investigate some possible ways to overcome these limitations. With the purpose of acquisition of an acceptable quality of fingerprint images, three components/enhancements are added into the traditional fingerprint recognition system in our proposed system. These are a fingerprint image enhancement algorithm, a fingerprint image quality evaluation algorithm and a feedback unit, the purpose of which is to provide analytical information collected at the image capture stage to the system user. In this thesis, all relevant information will be introduced, and we will also show some experimental results obtained with the proposed algorithms, and comparative studies with other existed algorithms will also be presented

    Fingerprint classification with combined neural networks

    Get PDF
    Biometric identification has been widely used in identifying a genuine person from an impostor. Fingerprint identification is becoming a very popular biometric identification technique because it has special properties: fingerprints are unique and unchangeable. With increased processing capability of computers and larger the size of fingerprint databases are increased, the demand for higher speed processing and greater processing capacity for automatic fingerprint identification systems (AFIS) has increased. APIS consists of fingerprint feature acquisition, fingerprint classification and fingerprint matching. Fingerprint classification plays a key role in fingerprint identification as efficient and accurate algorithms cannot only reduce the search time for searching large fingerprint databases, but they can also reduce the number of fingerprints that need to be searched.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Cancellable biometric using matrix approaches

    Get PDF
    PhD ThesisCancellable biometrics endeavour to hide the appearance of a biometric image into a transformed template which prevents the outsider from recognising whom the biometric belongs to. Current research into cancellable biometric methodologies concentrates on the details of biometric traits. This approach has a drawback which cannot possibly be implemented with other biometric technology. To address this problem, this thesis contributes to development of a novel concept for the feature transformation of biometric technology, especially for fingerprints, by utilizing several matrix operations to provide an alternative algorithm in order to produce multi-implementation of the cancellable system. The matrix operations generate the feature element of the input fingerprint image in an irrevocable form of output fingerprint template by ignoring the type of biometric traits unique to fingerprints; thus, the cancellable algorithm can be implemented in different biometrics technologies. The implementation offers a new concept in generating a cancellable template by considering a sequential procedure for the fingerprint processing, in order to allow the authentication process to succeed in authenticating an enquired input. For example, a region of interest (RoI) step is required to provide a square form input to support the system working in a matrix domain. Meanwhile, the input fingerprints are mostly in rectangular form. This thesis contributes a new approach to selecting a certain area of a fingerprint by utilizing the density of ridge frequency and orientation. The implementation of these two enhancement steps reduces the excision process of this significant region of the fingerprint by avoiding the involvement of a non-feature area. Meanwhile, to avoid obtaining an un classified fingerprint, this thesis offers a new approach to the fingerprint image classification process entailing three requirements in classifying the fingerprint: the core point and its number, ridge frequency, and ridge direction; whilst the tented arch (TA) is only an additional requirement. The proposed idea increases both the percentage accuracy in classifying fingerprints and time consuming of the system. For Example, the accuracy of the fingerprint classification improves from less than 41 per cent of the fingerprint to 86.48 per cent in average for all of databases.Directorate General of Higher Education of the Ministry of Education and Culture of the Republic of Indonesi

    Doctoral Thesis: Massive MIMO in Real Propagation Environments

    Get PDF
    Mobile communications are now evolving towards the fifth generation (5G). In the near future, we expect an explosive increase in the number of connected devices, such as phones, tablets, sensors, connected vehicles and so on. Much higher data rates than in today's 4G systems are required. In the 5G visions, better coverage in remote regions is also included, aiming for bringing the current "4 billion unconnected" population into the online world. There is also a great interest in "green communications", for less energy consumption in the ICT (information and communication technology) industry. Massive MIMO is a potential technology to fulfill the requirements and visions. By equipping a base station with a large number, say tens to hundreds, of antennas, many terminals can be served in the same time-frequency resource without severe inter-user interference. Through "aggressive" spatial multiplexing, higher data rates can be achieved without increasing the required spectrum. Processing efforts can be made at the base station side, allowing terminals to have simple and cheap hardware. By exploiting the many spatial degrees of freedom, linear precoding/detection schemes can be used to achieve near-optimal performance. The large number of antennas also brings the advantage of large array gain, resulting in an increase in received signal strength. Better coverage is thus achieved. On the other hand, transmit power from base stations and terminals can be scaled down to pursue energy efficiency. In the last five years, a lot of theoretical studies have been done, showing the extraordinary advantages of massive MIMO. However, the investigations are mainly based on theoretical channels with independent and identically distributed (i.i.d.) Gaussian coefficients, and sometimes assuming unlimited number of antennas. When bringing this new technology from theory to practice, it is important to understand massive MIMO behavior in real propagation channels using practical antenna arrays. Not much has been known about real massive MIMO channels, and whether the claims about massive MIMO still hold there, until the studies in this thesis were done. The thesis study connects the "ideal" world of theory to the "non-ideal" reality. Channel measurements for massive MIMO in the 2.6 GHz band were performed, in different propagation environments and using different types of antenna arrays. Based on obtained real-life channel data, the studies include • channel characterization to identify important massive MIMO properties, • evaluation of propagation conditions in real channels and corresponding massive MIMO performance, • channel modeling for massive MIMO to capture the identified channel properties, and • reduction of massive MIMO hardware complexity through antenna selection. The investigations in the thesis conclude that massive MIMO works efficiently in real propagation environments. The theoretical advantages, as observed in i.i.d. Rayleigh channels, can also be harvested in real channels. Important propagation effects are identified for massive MIMO scenarios, including channel variations over large arrays, multipath-component (MPC) lifetime, and 3D propagation. These propagation properties are modeled and included into the COST 2100 MIMO channel model as an extension for massive MIMO. The study on antenna selection shows that characteristics in real channels allow for significant reductions of massive MIMO complexity without significant performance loss. As one of the world's first research work on massive MIMO behavior in real propagation channels, the studies in this thesis promote massive MIMO as a practical technology for future communication systems

    Multi-Modal Biometrics: Applications, Strategies and Operations

    Get PDF
    The need for adequate attention to security of lives and properties cannot be over-emphasised. Existing approaches to security management by various agencies and sectors have focused on the use of possession (card, token) and knowledge (password, username)-based strategies which are susceptible to forgetfulness, damage, loss, theft, forgery and other activities of fraudsters. The surest and most appropriate strategy for handling these challenges is the use of naturally endowed biometrics, which are the human physiological and behavioural characteristics. This paper presents an overview of the use of biometrics for human verification and identification. The applications, methodologies, operations, integration, fusion and strategies for multi-modal biometric systems that give more secured and reliable human identity management is also presented
    corecore